authentication.mjs 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310
  1. import _ from 'lodash-es'
  2. import { generateError, generateSuccess } from '../../helpers/graph.mjs'
  3. import jwt from 'jsonwebtoken'
  4. import ms from 'ms'
  5. import { DateTime } from 'luxon'
  6. export default {
  7. Query: {
  8. /**
  9. * List of API Keys
  10. */
  11. async apiKeys (obj, args, context) {
  12. const keys = await WIKI.db.apiKeys.query().orderBy(['isRevoked', 'name'])
  13. return keys.map(k => ({
  14. id: k.id,
  15. name: k.name,
  16. keyShort: '...' + k.key.substring(k.key.length - 20),
  17. isRevoked: k.isRevoked,
  18. expiration: k.expiration,
  19. createdAt: k.createdAt,
  20. updatedAt: k.updatedAt
  21. }))
  22. },
  23. /**
  24. * Current API State
  25. */
  26. apiState () {
  27. return WIKI.config.api.isEnabled
  28. },
  29. /**
  30. * Fetch authentication strategies
  31. */
  32. async authStrategies () {
  33. return WIKI.data.authentication.map(stg => ({
  34. ...stg,
  35. isAvailable: stg.isAvailable === true
  36. }))
  37. },
  38. /**
  39. * Fetch active authentication strategies
  40. */
  41. async authActiveStrategies (obj, args, context) {
  42. const strategies = await WIKI.db.authentication.getStrategies({ enabledOnly: args.enabledOnly })
  43. return strategies.map(a => {
  44. const str = _.find(WIKI.data.authentication, ['key', a.module]) || {}
  45. return {
  46. ...a,
  47. config: _.transform(str.props, (r, v, k) => {
  48. r[k] = v.sensitive ? a.config[k] : '********'
  49. }, {})
  50. }
  51. })
  52. },
  53. /**
  54. * Fetch site authentication strategies
  55. */
  56. async authSiteStrategies (obj, args, context, info) {
  57. const site = await WIKI.db.sites.query().findById(args.siteId)
  58. const activeStrategies = await WIKI.db.authentication.getStrategies({ enabledOnly: true })
  59. return activeStrategies.map(str => {
  60. const siteAuth = _.find(site.config.authStrategies, ['id', str.id]) || {}
  61. return {
  62. id: str.id,
  63. activeStrategy: str,
  64. order: siteAuth.order ?? 0,
  65. isVisible: siteAuth.isVisible ?? false
  66. }
  67. })
  68. }
  69. },
  70. Mutation: {
  71. /**
  72. * Create New API Key
  73. */
  74. async createApiKey (obj, args, context) {
  75. try {
  76. const key = await WIKI.db.apiKeys.createNewKey(args)
  77. await WIKI.auth.reloadApiKeys()
  78. WIKI.events.outbound.emit('reloadApiKeys')
  79. return {
  80. key,
  81. operation: generateSuccess('API Key created successfully')
  82. }
  83. } catch (err) {
  84. WIKI.logger.warn(err)
  85. return generateError(err)
  86. }
  87. },
  88. /**
  89. * Perform Login
  90. */
  91. async login (obj, args, context) {
  92. try {
  93. const authResult = await WIKI.db.users.login(args, context)
  94. return {
  95. ...authResult,
  96. operation: generateSuccess('Login success')
  97. }
  98. } catch (err) {
  99. // LDAP Debug Flag
  100. if (args.strategy === 'ldap' && WIKI.config.flags.ldapdebug) {
  101. WIKI.logger.warn('LDAP LOGIN ERROR (c1): ', err)
  102. }
  103. console.error(err)
  104. return generateError(err)
  105. }
  106. },
  107. /**
  108. * Perform 2FA Login
  109. */
  110. async loginTFA (obj, args, context) {
  111. try {
  112. const authResult = await WIKI.db.users.loginTFA(args, context)
  113. return {
  114. ...authResult,
  115. responseResult: generateSuccess('TFA success')
  116. }
  117. } catch (err) {
  118. return generateError(err)
  119. }
  120. },
  121. /**
  122. * Perform Password Change
  123. */
  124. async changePassword (obj, args, context) {
  125. try {
  126. const authResult = await WIKI.db.users.loginChangePassword(args, context)
  127. return {
  128. ...authResult,
  129. responseResult: generateSuccess('Password changed successfully')
  130. }
  131. } catch (err) {
  132. return generateError(err)
  133. }
  134. },
  135. /**
  136. * Perform Forget Password
  137. */
  138. async forgotPassword (obj, args, context) {
  139. try {
  140. await WIKI.db.users.loginForgotPassword(args, context)
  141. return {
  142. responseResult: generateSuccess('Password reset request processed.')
  143. }
  144. } catch (err) {
  145. return generateError(err)
  146. }
  147. },
  148. /**
  149. * Register a new account
  150. */
  151. async register (obj, args, context) {
  152. try {
  153. await WIKI.db.users.register({ ...args, verify: true }, context)
  154. return {
  155. responseResult: generateSuccess('Registration success')
  156. }
  157. } catch (err) {
  158. return generateError(err)
  159. }
  160. },
  161. /**
  162. * Refresh Token
  163. */
  164. async refreshToken (obj, args, context) {
  165. try {
  166. let decoded = {}
  167. if (!args.token) {
  168. throw new Error('ERR_MISSING_TOKEN')
  169. }
  170. try {
  171. decoded = jwt.verify(args.token, WIKI.config.auth.certs.public, {
  172. audience: WIKI.config.auth.audience,
  173. issuer: 'urn:wiki.js',
  174. algorithms: ['RS256'],
  175. ignoreExpiration: true
  176. })
  177. } catch (err) {
  178. throw new Error('ERR_INVALID_TOKEN')
  179. }
  180. if (DateTime.utc().minus(ms(WIKI.config.auth.tokenRenewal)) > DateTime.fromSeconds(decoded.exp)) {
  181. throw new Error('ERR_EXPIRED_TOKEN')
  182. }
  183. const newToken = await WIKI.db.users.refreshToken(decoded.id)
  184. return {
  185. jwt: newToken.token,
  186. operation: generateSuccess('Token refreshed successfully')
  187. }
  188. } catch (err) {
  189. return generateError(err)
  190. }
  191. },
  192. /**
  193. * Set API state
  194. */
  195. async setApiState (obj, args, context) {
  196. try {
  197. WIKI.config.api.isEnabled = args.enabled
  198. await WIKI.configSvc.saveToDb(['api'])
  199. return {
  200. operation: generateSuccess('API State changed successfully')
  201. }
  202. } catch (err) {
  203. return generateError(err)
  204. }
  205. },
  206. /**
  207. * Revoke an API key
  208. */
  209. async revokeApiKey (obj, args, context) {
  210. try {
  211. await WIKI.db.apiKeys.query().findById(args.id).patch({
  212. isRevoked: true
  213. })
  214. await WIKI.auth.reloadApiKeys()
  215. WIKI.events.outbound.emit('reloadApiKeys')
  216. return {
  217. operation: generateSuccess('API Key revoked successfully')
  218. }
  219. } catch (err) {
  220. return generateError(err)
  221. }
  222. },
  223. /**
  224. * Update Authentication Strategies
  225. */
  226. async updateAuthStrategies (obj, args, context) {
  227. try {
  228. const previousStrategies = await WIKI.db.authentication.getStrategies()
  229. for (const str of args.strategies) {
  230. const newStr = {
  231. displayName: str.displayName,
  232. order: str.order,
  233. isEnabled: str.isEnabled,
  234. config: _.reduce(str.config, (result, value, key) => {
  235. _.set(result, `${value.key}`, _.get(JSON.parse(value.value), 'v', null))
  236. return result
  237. }, {}),
  238. selfRegistration: str.selfRegistration,
  239. domainWhitelist: { v: str.domainWhitelist },
  240. autoEnrollGroups: { v: str.autoEnrollGroups }
  241. }
  242. if (_.some(previousStrategies, ['key', str.key])) {
  243. await WIKI.db.authentication.query().patch({
  244. key: str.key,
  245. strategyKey: str.strategyKey,
  246. ...newStr
  247. }).where('key', str.key)
  248. } else {
  249. await WIKI.db.authentication.query().insert({
  250. key: str.key,
  251. strategyKey: str.strategyKey,
  252. ...newStr
  253. })
  254. }
  255. }
  256. for (const str of _.differenceBy(previousStrategies, args.strategies, 'key')) {
  257. const hasUsers = await WIKI.db.users.query().count('* as total').where({ providerKey: str.key }).first()
  258. if (_.toSafeInteger(hasUsers.total) > 0) {
  259. throw new Error(`Cannot delete ${str.displayName} as 1 or more users are still using it.`)
  260. } else {
  261. await WIKI.db.authentication.query().delete().where('key', str.key)
  262. }
  263. }
  264. await WIKI.auth.activateStrategies()
  265. WIKI.events.outbound.emit('reloadAuthStrategies')
  266. return {
  267. responseResult: generateSuccess('Strategies updated successfully')
  268. }
  269. } catch (err) {
  270. return generateError(err)
  271. }
  272. },
  273. /**
  274. * Generate New Authentication Public / Private Key Certificates
  275. */
  276. async regenerateCertificates (obj, args, context) {
  277. try {
  278. await WIKI.auth.regenerateCertificates()
  279. return {
  280. responseResult: generateSuccess('Certificates have been regenerated successfully.')
  281. }
  282. } catch (err) {
  283. return generateError(err)
  284. }
  285. },
  286. /**
  287. * Reset Guest User
  288. */
  289. async resetGuestUser (obj, args, context) {
  290. try {
  291. await WIKI.auth.resetGuestUser()
  292. return {
  293. responseResult: generateSuccess('Guest user has been reset successfully.')
  294. }
  295. } catch (err) {
  296. return generateError(err)
  297. }
  298. }
  299. },
  300. AuthenticationActiveStrategy: {
  301. strategy (obj, args, context) {
  302. return _.find(WIKI.data.authentication, ['key', obj.module])
  303. }
  304. }
  305. }